An issue was discovered in GNU LibreDWG through 0.9.3. Crafted input will lead to a heap-based buffer over-read in dwg_encode_entity in common_entity_data.spec.
References
Link | Resource |
---|---|
https://github.com/LibreDWG/libredwg/commit/3f503dd294efc63a59608d8a16058c41d44ba13a | Patch Third Party Advisory |
https://github.com/LibreDWG/libredwg/issues/178 | Exploit Third Party Advisory |
https://github.com/LibreDWG/libredwg/commit/3f503dd294efc63a59608d8a16058c41d44ba13a | Patch Third Party Advisory |
https://github.com/LibreDWG/libredwg/issues/178 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/LibreDWG/libredwg/commit/3f503dd294efc63a59608d8a16058c41d44ba13a - Patch, Third Party Advisory | |
References | () https://github.com/LibreDWG/libredwg/issues/178 - Exploit, Third Party Advisory |
Information
Published : 2020-07-16 18:15
Updated : 2024-11-21 04:39
NVD link : CVE-2019-20913
Mitre link : CVE-2019-20913
CVE.ORG link : CVE-2019-20913
JSON object : View
Products Affected
gnu
- libredwg
CWE
CWE-125
Out-of-bounds Read